Skip to content

Commit 319f6ca

Browse files
authored
KNOX-3223: Suppress cleanup, removed deprecations (#1133)
1 parent 63f78bd commit 319f6ca

File tree

26 files changed

+30
-68
lines changed

26 files changed

+30
-68
lines changed

gateway-adapter/src/test/java/org/apache/hadoop/gateway/shirorealm/KnoxLdapRealmTest.java

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -30,35 +30,35 @@ public class KnoxLdapRealmTest {
3030
public void setGetSearchBase() {
3131
KnoxLdapRealm realm = new KnoxLdapRealm();
3232
realm.setSearchBase("dc=hadoop,dc=apache,dc=org");
33-
assertEquals(realm.getSearchBase(), "dc=hadoop,dc=apache,dc=org");
33+
assertEquals("dc=hadoop,dc=apache,dc=org", realm.getSearchBase());
3434
}
3535

3636
@Test
3737
public void setGetGroupObjectClass() {
3838
KnoxLdapRealm realm = new KnoxLdapRealm();
3939
realm.setGroupObjectClass("groupOfMembers");
40-
assertEquals(realm.getGroupObjectClass(), "groupOfMembers");
40+
assertEquals("groupOfMembers", realm.getGroupObjectClass());
4141
}
4242

4343
@Test
4444
public void setGetUniqueMemberAttribute() {
4545
KnoxLdapRealm realm = new KnoxLdapRealm();
4646
realm.setMemberAttribute("member");
47-
assertEquals(realm.getMemberAttribute(), "member");
47+
assertEquals("member", realm.getMemberAttribute());
4848
}
4949

5050
@Test
5151
public void setGetUserSearchAttributeName() {
5252
KnoxLdapRealm realm = new KnoxLdapRealm();
5353
realm.setUserSearchAttributeName("uid");
54-
assertEquals(realm.getUserSearchAttributeName(), "uid");
54+
assertEquals("uid", realm.getUserSearchAttributeName());
5555
}
5656

5757
@Test
5858
public void setGetUserObjectClass() {
5959
KnoxLdapRealm realm = new KnoxLdapRealm();
6060
realm.setUserObjectClass("inetuser");
61-
assertEquals(realm.getUserObjectClass(), "inetuser");
61+
assertEquals("inetuser", realm.getUserObjectClass());
6262
}
6363

6464
@Test
@@ -74,7 +74,7 @@ public void setGetGroupSearchBase() {
7474
KnoxLdapRealm realm = new KnoxLdapRealm();
7575
realm.setSearchBase("dc=example,dc=com");
7676
realm.setGroupSearchBase("dc=knox,dc=example,dc=com");
77-
assertEquals(realm.getGroupSearchBase(), "dc=knox,dc=example,dc=com");
77+
assertEquals("dc=knox,dc=example,dc=com", realm.getGroupSearchBase());
7878
}
7979

8080
@Test
@@ -86,20 +86,20 @@ public void verifyDefaultUserSearchAttributeName() {
8686
@Test
8787
public void verifyDefaultGetUserObjectClass() {
8888
KnoxLdapRealm realm = new KnoxLdapRealm();
89-
assertEquals(realm.getUserObjectClass(), "person");
89+
assertEquals("person", realm.getUserObjectClass());
9090
}
9191

9292
@Test
9393
public void verifyDefaultUserSearchBase() {
9494
KnoxLdapRealm realm = new KnoxLdapRealm();
9595
realm.setSearchBase("dc=knox,dc=example,dc=com");
96-
assertEquals(realm.getUserSearchBase(), "dc=knox,dc=example,dc=com");
96+
assertEquals("dc=knox,dc=example,dc=com", realm.getUserSearchBase());
9797
}
9898

9999
@Test
100100
public void verifyDefaultGroupSearchBase() {
101101
KnoxLdapRealm realm = new KnoxLdapRealm();
102102
realm.setSearchBase("dc=knox,dc=example,dc=com");
103-
assertEquals(realm.getGroupSearchBase(), "dc=knox,dc=example,dc=com");
103+
assertEquals("dc=knox,dc=example,dc=com", realm.getGroupSearchBase());
104104
}
105105
}

gateway-adapter/src/test/java/org/apache/hadoop/gateway/shirorealm/KnoxPamRealmTest.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ public class KnoxPamRealmTest {
3737
public void setService() {
3838
KnoxPamRealm realm = new KnoxPamRealm();
3939
realm.setService("knox-pam-os-service");
40-
assertEquals(realm.getService(), "knox-pam-os-service");
40+
assertEquals("knox-pam-os-service", realm.getService());
4141
}
4242

4343
@Test

gateway-discovery-cm/src/main/java/org/apache/knox/gateway/topology/discovery/cm/monitor/PollingConfigurationAnalyzer.java

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -521,7 +521,6 @@ private List<RelevantEvent> getRelevantEvents(final String address, final String
521521
return relevantEvents;
522522
}
523523

524-
@SuppressWarnings("unchecked")
525524
private boolean isStartEvent(ApiEvent event) {
526525
final Map<String, Object> attributeMap = getAttributeMap(event.getAttributes());
527526
final String command = getAttribute(attributeMap, COMMAND);

gateway-provider-identity-assertion-common/src/main/java/org/apache/knox/gateway/identityasserter/common/filter/AbstractIdentityAssertionFilter.java

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,6 @@
1818
package org.apache.knox.gateway.identityasserter.common.filter;
1919

2020
import java.io.IOException;
21-
import java.security.AccessController;
2221
import java.security.Principal;
2322
import java.security.PrivilegedActionException;
2423
import java.security.PrivilegedExceptionAction;
@@ -52,8 +51,6 @@
5251
import org.apache.knox.gateway.security.PrimaryPrincipal;
5352
import org.apache.knox.gateway.security.SubjectUtils;
5453

55-
import de.thetaphi.forbiddenapis.SuppressForbidden;
56-
5754
public abstract class AbstractIdentityAssertionFilter extends
5855
AbstractIdentityAssertionBase implements Filter {
5956

@@ -89,7 +86,6 @@ public AbstractIdentityAssertionFilter() {
8986
*/
9087
public abstract String mapUserPrincipal(String principalName);
9188

92-
@SuppressForbidden
9389
protected void continueChainAsPrincipal(HttpServletRequestWrapper request, ServletResponse response,
9490
FilterChain chain, String mappedPrincipalName, String[] groups) throws IOException,
9591
ServletException {
@@ -102,7 +98,7 @@ protected void continueChainAsPrincipal(HttpServletRequestWrapper request, Servl
10298
boolean groupsMapped;
10399

104100
// look up the current Java Subject and assosciated group principals
105-
Subject currentSubject = Subject.getSubject(AccessController.getContext());
101+
Subject currentSubject = SubjectUtils.getCurrentSubject();
106102
if (currentSubject == null) {
107103
LOG.subjectNotAvailable();
108104
throw new IllegalStateException("Required Subject Missing");

gateway-provider-identity-assertion-common/src/main/java/org/apache/knox/gateway/identityasserter/common/filter/CommonIdentityAssertionFilter.java

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,6 @@
2323
import static org.apache.knox.gateway.util.AuthFilterUtils.PROXYGROUP_PREFIX;
2424

2525
import java.io.IOException;
26-
import java.security.AccessController;
2726
import java.util.ArrayList;
2827
import java.util.Arrays;
2928
import java.util.Collections;
@@ -45,7 +44,6 @@
4544
import javax.servlet.http.HttpServletRequestWrapper;
4645
import javax.servlet.http.HttpServletResponse;
4746

48-
import de.thetaphi.forbiddenapis.SuppressForbidden;
4947
import org.apache.commons.lang3.ArrayUtils;
5048
import org.apache.commons.lang3.StringUtils;
5149
import org.apache.knox.gateway.IdentityAsserterMessages;
@@ -222,11 +220,10 @@ public void destroy() {
222220
* to the identity to be asserted as appropriate and create the provider specific
223221
* assertion token. Add the assertion token to the request.
224222
*/
225-
@SuppressForbidden
226223
@Override
227224
public void doFilter(ServletRequest request, ServletResponse response, FilterChain chain)
228225
throws IOException, ServletException {
229-
Subject subject = Subject.getSubject(AccessController.getContext());
226+
Subject subject = SubjectUtils.getCurrentSubject();
230227

231228
if (subject == null) {
232229
LOG.subjectNotAvailable();

gateway-provider-identity-assertion-common/src/test/java/org/apache/knox/gateway/identityasserter/common/filter/VirtualGroupMapperTest.java

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,6 @@
3939
import javax.servlet.ServletRequest;
4040
import javax.servlet.http.HttpServletRequest;
4141

42-
@SuppressWarnings("PMD.NonStaticInitializer")
4342
public class VirtualGroupMapperTest {
4443
private Parser parser = new Parser();
4544
private VirtualGroupMapper mapper;
@@ -159,4 +158,4 @@ private Set<String> virtualGroups(String user1, List<String> ldapGroups, Servlet
159158
private static Set<String> setOf(String... strings) {
160159
return new HashSet<>(Arrays.asList(strings));
161160
}
162-
}
161+
}

gateway-provider-identity-assertion-hadoop-groups/src/test/java/org/apache/knox/gateway/identityasserter/hadoop/groups/filter/HadoopGroupProviderFilterTest.java

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -142,7 +142,6 @@ public void testUnknownUser() throws ServletException {
142142
* {@link LdapGroupsMapping} and in case of bad config we get empty groups
143143
* (Hadoop way).
144144
*/
145-
@SuppressWarnings({ "unchecked", "rawtypes" })
146145
@Test
147146
public void badConfigTest() throws ServletException {
148147

gateway-provider-rewrite-common/src/main/java/org/apache/knox/gateway/filter/rewrite/impl/UrlRewriteRulesDescriptorImpl.java

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -91,14 +91,12 @@ public <T extends UrlRewriteFunctionDescriptor<?>> T getFunction( String name )
9191
}
9292

9393
@Override
94-
@SuppressWarnings("unchecked")
9594
public <T extends UrlRewriteFunctionDescriptor<?>> T addFunction( String name ) {
9695
T descriptor = newFunction( name );
9796
addFunction( descriptor );
9897
return descriptor;
9998
}
10099

101-
@SuppressWarnings("unchecked")
102100
protected <T extends UrlRewriteFunctionDescriptor<?>> T newFunction( String name ) {
103101
return UrlRewriteFunctionDescriptorFactory.create( name );
104102
}

gateway-provider-rewrite-common/src/main/java/org/apache/knox/gateway/filter/rewrite/spi/UrlRewriteFlowDescriptorBase.java

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,6 @@ public List<UrlRewriteStepDescriptor> steps() {
105105
// return step;
106106
// }
107107

108-
@SuppressWarnings( "unchecked" )
109108
@Override
110109
public <T extends UrlRewriteStepDescriptor<?>> T addStep( String type ) {
111110
T step = UrlRewriteStepDescriptorFactory.create( type );

gateway-provider-security-hadoopauth/src/test/java/org/apache/knox/gateway/hadoopauth/HadoopAuthDeploymentContributorTest.java

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -46,11 +46,10 @@
4646

4747
public class HadoopAuthDeploymentContributorTest {
4848

49-
@SuppressWarnings("rawtypes")
5049
@Test
5150
public void testServiceLoader() {
52-
ServiceLoader loader = ServiceLoader.load( ProviderDeploymentContributor.class );
53-
Iterator iterator = loader.iterator();
51+
ServiceLoader<ProviderDeploymentContributor> loader = ServiceLoader.load( ProviderDeploymentContributor.class );
52+
Iterator<ProviderDeploymentContributor> iterator = loader.iterator();
5453
assertThat( "Service iterator empty.", iterator.hasNext() );
5554
while( iterator.hasNext() ) {
5655
Object object = iterator.next();

0 commit comments

Comments
 (0)